12
GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS AND CERTIFICATIONS Global Knowledge’s unrivalled cybersecurity learning portfolio is delivered across more modalities than any other provider in the world; this means that however you and your team prefer to learn, we have the solution. We will hold your hand through the learning assessment to ensure we provide you with the learning solutions that build fundamental to advanced cybersecurity techniques, prepare you for top industry- recognised certifications and master product-specific skills. Global Knowledge have the learning solutions to equip organisations and individuals with the skills and capabilities they need to safeguard their data in the cloud and on-premises, reducing the risk of business interruption and data breaches. Our cybersecurity learning solutions encompass globally recognised accreditations covering generic policy, procedures, governance and protocols; which complement and dovetail into our library of technology provider learning solutions including, Microsoft and AWS. www.globalknowledge.com

GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS AND CERTIFICATIONS

Global Knowledge’s unrivalled cybersecurity learning portfolio is delivered across more modalities than any other provider in the world; this means that however you and your team prefer to learn, we have the solution. We will hold your hand through the learning assessment to ensure we provide you with the learning solutions that build fundamental to advanced cybersecurity techniques, prepare you for top industry-recognised certifications and master product-specific skills.

Global Knowledge have the learning solutions to equip organisations and individuals with the skills and capabilities they need to safeguard their data in the cloud and on-premises, reducing the risk of business interruption and data breaches. Our cybersecurity learning solutions encompass globally recognised accreditations covering generic policy, procedures, governance and protocols; which complement and dovetail into our library of technology provider learning solutions including, Microsoft and AWS.

www.globalknowledge.com

Page 2: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

$ 4.24

89%

CLOUD CYBERSECURITY IS A TOP PRIORITY FOR ALL BUSINESS LEADERSAs Data Breaches Soar the Demand for Trained and Certified Cybersecurity Professionals Accelerates

The demand for skills development and training in the Cybersecurity space is monumental

The average cost of a data breach to organisations is at an all-time high at $4.24 million

IBM Annual Cost of Data Breach Report 2021

The global Cybersecurity workforce needs to grow by 89%

2020 ISC2 Survey

50% of businesses have basic cyber skill gaps which hinder or prevent them from carrying out the tasks laid out in the government-endorsed Cyber Essentials Scheme.

Cyber security skills in the UK labour market 2021 Findings Report - Department for Digital, Culture, Media & Sport (DCMS)

33% of businesses have skills gaps in penetration testing, forensic analysis and security architecture.

Cyber security skills in the UK labour market 2021 Findings Report - Department for Digital, Culture, Media & Sport (DCMS)

32% of businesses have skills gaps in incident response.

Cyber security skills in the UK labour market 2021 Findings Report - Department for Digital, Culture, Media & Sport (DCMS)

www.globalknowledge.com

2 CYBERSECURITY TECHNOLOGY

Page 3: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

Technology:

Technology Solutions Training

•Amazon Web Services •Checkpoint •Cisco •Dell SonicWALL •F5 •IBM •Juniper •Microsoft •Palo Alto •Solar Winds

ProcessFrameworks •COBIT •COSO •CSIS •ISO27000 •NICE •NIST •OCTAVE

Governance and ComplianceStandards •HIPPA •PCI-DSS •ISO27001 •Sarbanes - Oxley

People:

Cybersecurity Awareness and Fundementals

Certification Prep/Bodies of Knowledge •CompTIA. •EC-Council •IAPP •ISACA •ISC2

www.globalknowledge.com

3 CYBERSECURITY TECHNOLOGY

CLOUD CYBERSECURITY IS A TOP PRIORITY FOR ALL BUSINESS LEADERS

People, Process and Technology

Cybersecurity is an obligation, not an option. It’s a shared responsibility, conceptually and in real world practice and it starts at the top with the CIO who needs to ensure the organisations security needs are prioritised and properly addressed. The make-up of the cybersecurity team, both technical and non-technical, will vary by organisation, but regardless of their capacity they will all require training. To close the loop it is essential that all device users receive training and guidance to protect their devices against the risk of a data breach.

Global Knowledge is uniquely placed to address the 3 pillars of cybersecurity – People , Process and Technology. Our ability to deliver across all three areas makes us unique in the marketplace.

Page 4: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

GOVERNANCE, RISK & COMPLIANCE

Measures and quantifies risk, performs internal

audits against best practices and standards,

develops plans for business continuity and

disaster recovery

Job RolesGovernance, Risk and Compliance Officer

Risk Manager

Security Auditor

FORENSIC AND INCIDENT RESPONSE

Detect, analyse, contain, eradicate and recover from a security event

Job RolesSecurity Investigator

Data Forensic Analyst

Malware Researcher

ETHICAL HACKING & PENETRATION TESTING

Understand hacking methods, identify

vulnerabilities and fix them, before penetration

testing your network

Job RolesEthical / White Hat

Hacker

Pen Tester (Red Team)

Vulnerability Assessor

CYBERSECURITY OPERATIONS

Manages Identification, authorisation and

permissions across all systems and continually

monitors the security posture of the network

Job RolesSecurity Operations

Centre (SOC) Analyst / Manager

Cyber Operations Specialist

Intrusion Detection Analyst

INFORMATION SECURITY /

CYBERSECURITY MANAGEMENT

Designs and implements secure architectures, translates standards,

business processes and frameworks into internal

policies

Job RolesCloud Security Architect

Network Security Administrator

Business Continuity Manager

DATA PRIVACY

Define who has access to data and implement tools

and policies to provide data protection

Job Roles

Data Privacy Officer

Lead Privacy Manager

Security and Privacy Engineer

www.globalknowledge.com

4 CYBERSECURITY TECHNOLOGY

Cybersecurity teams are structured in various ways according to an organisations specific needs, but generally they are sub-divided into several functional areas or domains:-

Page 5: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

CYBERSECURITY THREATS

SECURE CODING

Integrate secure coding practices into software development lifecyle

(SDLC) including application testing

Job Roles

Cybersecurity software Developer / Engineer

Application Developer

Source Code Auditor

CLOUD SECURITY

Policies, controls, procedures and

technologies that work together to protect

cloud-based systems

Job Roles

Cloud Architect

Cloud Security Analyst

Cloud Security Specialist

www.globalknowledge.com

5 CYBERSECURITY TECHNOLOGY

Page 6: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

www.globalknowledge.com

6 CYBERSECURITY TECHNOLOGY

The cybersecurity roadmap below illustrates the Global Knowledge portfolio of cybersecurity courses by the domains described above and by levels of experience and expertise.

ETH

ICA

L H

AC

KIN

G

&

PEN

ETR

ATI

ON

TE

STIN

G

CY

BER

SEC

UR

ITY

O

PER

ATI

ON

S

INFO

RM

ATI

ON

SE

CU

RIT

Y /

C

YB

ERSE

CU

RIT

Y

MA

NA

GEM

ENT

GO

VER

NA

NC

E, R

ISK

&

CO

MPL

IAN

CE

FOR

ENSI

C A

ND

IN

CID

ENT

RES

PON

SE

DA

TA P

RIV

AC

Y

SEC

UR

E C

OD

ING

CLO

UD

SEC

UR

ITY

CPENT AMH CISSP CCISO CHFI CDPSE SCT CCSK

G015 CBR CISAU ISO27701 LA FOR CIPM CASE

PTCMW ECES GK2951 CGEIT AMH CIPPE

360PTC RBO CISMP ISO27001 LI ECIH CIPPE-CIPM

RBO CTIA SSCP CCAK CIPPE-CIPT

CTIA EC-CSA CSSLP CRISC CIPT-IAPP

CEH CySA+ CCSP SCT

CAP

ECES

CCAK

CISM

PKI

CND

9701

G013

CSCU

Page 7: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

www.globalknowledge.com

7 CYBERSECURITY TECHNOLOGY

Global Knowledge are an EC-Council ATC within EMEA; continually delivering EC-Council accredited training to thousands of delegates across the entire portfolio of learning.

EC-Council courses are designed to help organisations and Individuals take pre-emptive measures against malicious attacks, by learning how to identify and defend the weaknesses in their own network.

Certified Security Computer User

Certified Network Defender

Certified Ethical Hacker Certified Penetration Tester

112-12 Exam 312-38 Exam 312-50 Exam

Certified Penetration Testing Professional

Exam

Certified Application Security Engineer . NET

Certified Application Security Engineer .

JAVACertified Threat

Intelligence AnalystEC Council Certified Encryption Specialist

Computer Hacking Forensic Investigator

Certified Application Security Engineer Exam 312-85 Exam ECES Exam 312-49 Exam

Certified Chief Information Security

OfficerCertified SOC Analyst EC Council Certified

Incident Handler

712-50 Exam 312-39 Exam 212-89 Exam

Page 8: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

www.globalknowledge.com

8 CYBERSECURITY TECHNOLOGY

Global Knowledge are an Elite+ partner to ISACA and their largest partner in Europe. Our geographic footprint enables us to deliver ISACA knowledge, skills and accreditations across the globe.

ISACA’s globally recognised accreditations provide professionals with the skills to lead, adapt and assure trust in an evolving digital world, by offering access to innovative and world-class knowledge, standards, networking, credentialing and career development.

Once you have passed the certification exam you have 5 years in which to apply for the certification, you must have five or more years of professional experience in the relevant job practice areas.

Global Knowledge are the EMEA CompTIA Delivery Partner of the Year 2019, 2020 and 2021; and the only partner to have held this accolade for three years. Within this remit we deliver the most comprehensive and largest portfolio of CompTIA learning solutions and certifications; delivered in multiple modalities and time zones.

CompTIA’s vendor-neutral certifications are recognised worldwide. CompTIA’s portfolio aligns cybersecurity career paths, designed to take you from foundation to expert with each certification providing an additional depth of expertise.

CISA Exam CISM Exam CRISC Exam CGEIT Exam CDPSE Exam

CS0-001 Exam SY0-601 Exam PT0-001 Exam CAS-003 Exam

Page 9: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

www.globalknowledge.com

9 CYBERSECURITY TECHNOLOGY

Global Knowledge are a trusted partner to (ISC)² and one of the go to market organisations for their training. Our ability to deliver in multiple languages makes us the go to provider for international organisations.

(ISC)² information security certifications are recognised as the global standard for excellence. Being certified means your organisation is better prepared to protect your critical information assets and infrastructures.

Certified Information Systems Security

Professional

Certified Cloud Security Professional

Certified Secure Software Lifecycle

Professional

Systems Security Certified Practitioner

Certified Authorisation Professional

CISSP Exam CCSP Exam CSSLP Exam SSCP Exam CAP Exam

Page 10: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

CISCO

RED HAT

JUNIPER

PALO ALTO

Cloud Providers

InfrastructureProviders

MICROSOFT

AWS

IBM

GOOGLE

www.globalknowledge.com

10 CYBERSECURITY TECHNOLOGY

To create a protective and secure network environment your cybersecurity learning strategy has to include the security elements specific to your network technologies and platforms. Our learning advisors will work with you to design a learning itinerary that meets the needs of your teams, the specifics of your network, your organisational goals and learning preferences. Here’s a taster of just some of the technologies in which we specialise:-

Page 11: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

www.globalknowledge.com

11 CYBERSECURITY TECHNOLOGY

GK Polaris: Unlimited Training Subscriptions

GK Polaris Accelerate

Technology is constantly changing, and the role of IT professionals is continually evolving. Continuous learning is the key to keeping your skills current and ensuring you have what it takes to rise to the digital transformation challenge.

GK Polaris provides three subscription options. The Discovery plan includes 200+ live virtual courses. The Accelerate plan consists of hundreds of authorised on-demand courses with related challenge-based activities. The Launch plan delivers 200+ on-demand courses.

GK Polaris Accelerate is designed to develop and reinforce the competencies IT professionals need on the job. This is enabled by unlimited access to over 18,000 hours of vendor-authorised and industry-validated on-demand courses, certification prep, practice exams, labs, learning paths and more. Topics include: AWS, CompTia, EC-Council, Google Cloud, Linux, Microsoft, Cloud, Cybersecurity, Data Science, Leadership, Programming, Project Management, Networking and more.

•Access to hundreds of hands-on exercises, challenges and monthly CyberQ Cyber Ranges.•8,000+ hours of on-demand courses, 10,000 digital books, 1,400 hours of labs and 2,600+ hours of exam prep in Percipio, Skillsoft’s cutting-edge learning platform.•Aspire learning journeys that provide clear development paths for critical job roles.•Short, live-streamed bootcamps in subjects such as AWS, Microsoft, cybersecurity and programming.•Coding sandboxes to practice in non-production environments.•Live mentors through chat or email.

GK PolarisA robust cybersecurity strategy requires a long-term, agile commitment to continuing education. GK Polaris Accelerate provides the perfect vehicle to ensure your teams have access to the training they need to develop, evolve and continually test their skills.

Page 12: GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS …

Global Knowledge/Skillsoft has an unrivalled global reach serving approximately 70% of the fortune 1000 customers in over 160 countries and more than 45 million learners globally

•Interact face-to-face with subject matter experts.•Work on state-of-the-art equipment in a ready-to-learn environment.•Training locations located around the world.

•Convenient 24/7 access to instructor-led videos and hands-on activities.•Learn at your own pace and on any device.

•Experience live instructor-led online training from the location of your choice.•Participate in exercises and collaborate with peers.

•Exam readiness courses.•One-day condensed workshop.•Get ready by covering exam topics / sample questions.

•Experience live instructor-led online training from the location of your choice.•Participate in exercises and collaborate with peers.

Our IT training subscriptions feature on-demand learning from leading technology providers like AWS, Cisco, Microsoft and Red Hat. Through combinations of on-demand content, instructor-led videos, hands-on labs and IT certification training, you’ll build new skills and keep your current skills razor sharp. Best of all, you’ll have instant access to your online IT training, whenever you need it—for a full year.

CLASSROOM LIVE

ON-DEMAND

VIRTUAL CLASSROOM LIVE

EXAM PREPARATION

PRIVATE COMPANY TRAINING

UNLIMITED TRAINING SUBSCRIPTIONS

www.globalknowledge.com

12 CYBERSECURITY TECHNOLOGY

Plan Your Training:Whether instructor-led or self-paced, in our classroom, at your company or online, our convenient delivery formats enable you and your team to get the training you need, where, when and how you want it.